[unisog] New (No kidding) RPC Vulnerability

Edward W. Ray support at mmicman.com
Thu Sep 11 04:59:56 GMT 2003

How about getting rid of the "SYSTEM" user?  The kernel model for Windows is
horribly flawed; they will NEVER be able to secure their OS until ALL
services or applications can be run with non-administrator privileges.

My $0.02

Edward W. Ray

-----Original Message-----
From: Gary Flynn [mailto:flynngn at jmu.edu] 
Sent: Wednesday, September 10, 2003 1:58 PM
Cc: unisog at sans.org
Subject: Re: [unisog] New (No kidding) RPC Vulnerability

Dax wrote:

> 	Sadly, I can't even come up with something quick and witty to say, 
> thanks to my slack-jawed state of disbelief...
> http://www.microsoft.com/technet/security/bulletin/MS03-039.asp
> http://www.microsoft.com/security/security_bulletins/MS03-039.asp
> 	Sooo...good job patching for Blaster everyone...Next!

And just to avoid confusion, it IS a new defect:

The patch fixes both the old and new defects. Doesn't look as easy to
exploit but there is a lot of attention being paid to it. :(

Gary Flynn
Security Engineer - Technical Services
James Madison University

Please R.U.N.S.A.F.E.

More information about the unisog mailing list